Skip to content

Documentation of the security model#503

Merged
tgraf merged 2 commits intomasterfrom
policy-doc
Apr 10, 2017
Merged

Documentation of the security model#503
tgraf merged 2 commits intomasterfrom
policy-doc

Conversation

@tgraf
Copy link
Copy Markdown
Contributor

@tgraf tgraf commented Apr 3, 2017



 

@tgraf tgraf added the kind/enhancement This would improve or streamline existing functionality. label Apr 3, 2017
@tgraf tgraf added this to the 0.9 milestone Apr 3, 2017
@tgraf tgraf force-pushed the policy-doc branch 17 times, most recently from c7d264a to e1500c8 Compare April 10, 2017 16:33
@tgraf tgraf requested review from aanm, borkmann and mchalla April 10, 2017 16:40
Copy link
Copy Markdown
Member

@aanm aanm left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In the image, why does role= have a different color? Do you think the image should also contain the source concept?

Copy link
Copy Markdown
Member

@borkmann borkmann left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks great, couple of minor things commented.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This makes scaling efficiently difficult. Perhaps This makes it difficult to scale efficiently.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Perhaps clear transition from labels to identity is a bit missing. Maybe Instead, security is based on the identity of a pod, which is derived through labels.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

will creats

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

are subject to being be considered

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

labels The standard

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

unless policy policy enforcement is

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe cilium monitor could be mentioned here on how to debug drops and policy violations. But could be a future section for debugging/introspection perhaps. Could also have the links to the ascii cinema demos.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In the readthedocs, somehow this rightmost cell is cut off to fit the page, scrolling to the right by marking the text.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe link to ascii demo.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Will do once it is linked

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/node/nodes/

tgraf added 2 commits April 10, 2017 20:55
Initial version of the security policy model documentation

Signed-off-by: Thomas Graf <[email protected]>
@tgraf
Copy link
Copy Markdown
Contributor Author

tgraf commented Apr 10, 2017

In the image, why does role= have a different color? Do you think the image should also contain the source concept?

The graphics can definitely be done better. Agreed that source needs to be documented as well. This is no way near complete. It's a start.

@tgraf tgraf merged commit c9589d6 into master Apr 10, 2017
@tgraf tgraf deleted the policy-doc branch April 10, 2017 20:55
michi-covalent pushed a commit to michi-covalent/cilium that referenced this pull request May 30, 2023
Follow-up for cilium#503 to address
cilium/cilium-cli#503 (comment)

Also add a comment so we don't forget to re-enable the check again once
issue cilium#361 is resolved.

Signed-off-by: Tobias Klauser <[email protected]>
yoursanonymous pushed a commit to yoursanonymous/cilium that referenced this pull request Jan 31, 2026
* chore: update footer and add blog post

* chore: update blog link

* chore: add license link
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

kind/enhancement This would improve or streamline existing functionality.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants